Sciweavers

3216 search results - page 508 / 644
» Software engineering issues for mobile application developme...
Sort
View
CSMR
2009
IEEE
15 years 4 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou
PASTE
2005
ACM
15 years 3 months ago
Automatically generating refactorings to support API evolution
When library APIs change, client code should change in response, in order to avoid erroneous behavior, compilation failures, or warnings. Previous research has introduced techniqu...
Jeff H. Perkins
WOSP
2004
ACM
15 years 3 months ago
Generating realistic workloads for network intrusion detection systems
While the use of network intrusion detection systems (nIDS) is becoming pervasive, evaluating nIDS performance has been found to be challenging. The goal of this study is to deter...
Spyros Antonatos, Kostas G. Anagnostakis, Evangelo...
SEM
2004
Springer
15 years 3 months ago
PlanetSim: A New Overlay Network Simulation Framework
Abstract. Current research in peer to peer systems is lacking appropriate environments for simulation and experimentation of large scale overlay services. This has led to a plethor...
Pedro García López, Carles Pairot, R...
KBSE
2003
IEEE
15 years 3 months ago
Aspectizing Server-Side Distribution
We discuss how a collection of domain-specific and domain-independent tools can be combined to “aspectize” the distributed character of server-side applications, to a much gr...
Eli Tilevich, Stephan Urbanski, Yannis Smaragdakis...